eve-fullstack-app-design
Original:🇺🇸 English
Translated
Architect a full-stack application on Eve Horizon — manifest-driven services, managed databases, build pipelines, deployment strategies, secrets, and observability. Use when designing a new app, planning a migration, or evaluating your architecture.
2installs
Sourceincept5/eve-skillpacks
Added on
NPX Install
npx skill4agent add incept5/eve-skillpacks eve-fullstack-app-designTags
Translated version includes tags in frontmatterSKILL.md Content
View Translation Comparison →Full-Stack App Design on Eve Horizon
Architect applications where the manifest is the blueprint, the platform handles infrastructure, and every design decision is intentional.
When to Use
Load this skill when:
- Designing a new application from scratch on Eve
- Migrating an existing app onto the platform
- Evaluating whether your current architecture uses Eve's capabilities well
- Planning service topology, database strategy, or deployment pipelines
- Deciding between managed and external services
This skill teaches design thinking for Eve's PaaS layer. For CLI usage and operational detail, load the corresponding eve-se skills (, , , ).
eve-manifest-authoringeve-deploy-debuggingeve-auth-and-secretseve-pipelines-workflowsThe Manifest as Blueprint
The manifest () is the single source of truth for your application's shape. Treat it as an architectural document, not just configuration.
.eve/manifest.yamlWhat the Manifest Declares
| Concern | Manifest Section | Design Decision |
|---|---|---|
| Service topology | | What processes run, how they connect |
| Infrastructure | | Managed DB, ingress, roles |
| Build strategy | | What gets built, where images live |
| Release pipeline | | How code flows from commit to production |
| Environment shape | | Which environments exist, what pipelines they use |
| Agent configuration | | Agent profiles, team dispatch, chat routing |
| Runtime defaults | | Harness, workspace, git policies |
Design principle: If an agent or operator can't understand your app's shape by reading the manifest, the manifest is incomplete.
Service Topology
Choose Your Services
Most Eve apps follow one of these patterns:
API + Database (simplest):
services:
api: # HTTP service with ingress
db: # managed PostgresAPI + Worker + Database:
services:
api: # HTTP service (user-facing)
worker: # Background processor (jobs, queues)
db: # managed PostgresMulti-Service:
services:
web: # Frontend/SSR
api: # Backend API
worker: # Background jobs
db: # managed Postgres
redis: # external cache (x-eve.external: true)Service Design Rules
- One concern per service. Separate HTTP serving from background processing. An API service should not also run scheduled jobs.
- Use managed DB for Postgres. Declare and let the platform provision, connect, and inject credentials. No manual connection strings.
x-eve.role: managed_db - Mark external services explicitly. Use with
x-eve.external: truefor services hosted outside Eve (Redis, third-party APIs).x-eve.connection_url - Use for one-off tasks. Migrations, seeds, and data backfills are job services, not persistent processes.
x-eve.role: job - Expose ingress intentionally. Only services that need external HTTP access get . Internal services communicate via cluster networking.
x-eve.ingress.public: true
Platform-Injected Variables
Every deployed service receives , , , , and . Use for server-to-server calls. Use for browser-facing code. Design your app to read these rather than hardcoding URLs.
EVE_API_URLEVE_PUBLIC_API_URLEVE_PROJECT_IDEVE_ORG_IDEVE_ENV_NAMEEVE_API_URLEVE_PUBLIC_API_URLDatabase Design
Provisioning
Declare a managed database in the manifest:
yaml
services:
db:
x-eve:
role: managed_db
managed:
class: db.p1
engine: postgres
engine_version: "16"Reference the connection URL in other services: .
${managed.db.url}Schema Strategy
- Migrations are first-class. Use to create migration files. Use
eve db newto apply them. Never modify production schemas by hand.eve db migrate - Design for RLS from the start. If agents or users will query the database directly, scaffold RLS helpers early: . Retrofitting row-level security is painful.
eve db rls init --with-groups - Inspect before changing. Use to examine current schema. Use
eve db schemafor ad-hoc queries during development. Useeve db sql --env <env>mode for local dev tools that need a raw connection string.--direct-url - Separate app data from agent data. Use distinct schemas or naming conventions. App tables serve the product; agent tables serve memory and coordination (see for storage patterns).
eve-agent-memory
Access Patterns
| Who Queries | How | Auth |
|---|---|---|
| App service | | Connection string injected at deploy |
| Agent via CLI | | Job token scopes access |
| Agent via RLS | SQL with | Session context set by runtime |
Build and Release Pipeline
The Canonical Flow
Every production app should follow :
build -> release -> deployyaml
pipelines:
deploy:
steps:
- name: build
action:
type: build # Creates BuildSpec + BuildRun, produces image digests
- name: release
depends_on: [build]
action:
type: release # Creates immutable release from build artifacts
- name: deploy
depends_on: [release]
action:
type: deploy # Deploys release to target environmentWhy this matters: The build step produces SHA256 image digests. The release step pins those exact digests. The deploy step uses the pinned release. You deploy exactly what you built — no tag drift, no "latest" surprises.
Registry Decisions
| Option | When to Use |
|---|---|
| Default. Internal registry with JWT auth. Simplest setup. |
| BYO registry (GHCR, ECR) | When you need images accessible outside Eve, or have existing CI. |
| Public base images only. No custom builds. |
For GHCR, add OCI labels to Dockerfiles for automatic repository linking:
dockerfile
LABEL org.opencontainers.image.source="https://github.com/YOUR_ORG/YOUR_REPO"Build Configuration
Every service with a custom image needs a section:
buildyaml
services:
api:
build:
context: ./apps/api
dockerfile: Dockerfile
image: ghcr.io/org/my-apiUse multi-stage Dockerfiles. BuildKit handles them natively. Place the OCI label on the final stage.
Deployment and Environments
Environment Strategy
| Environment | Type | Purpose | Pipeline |
|---|---|---|---|
| persistent | Integration testing, demos | |
| persistent | Live traffic | |
| temporary | PR previews, feature branches | |
Link each environment to a pipeline in the manifest:
yaml
environments:
staging:
pipeline: deploy
production:
pipeline: deployDeployment Patterns
Standard deploy: triggers the linked pipeline.
eve env deploy staging --ref main --repo-dir .Direct deploy (bypass pipeline): for emergencies or simple setups.
eve env deploy staging --ref <sha> --directPromotion: Build once in staging, then promote the same release artifacts to production. The build step's digests carry forward, guaranteeing identical images.
Recovery
When a deploy fails:
- Diagnose: — shows health, recent deploys, service status.
eve env diagnose <project> <env> - Logs: — container output.
eve env logs <project> <env> - Rollback: Redeploy the previous known-good release.
- Reset: — nuclear option, reprovisions from scratch.
eve env reset <project> <env>
Design your app to be rollback-safe: migrations should be forward-compatible, and services should handle schema version mismatches gracefully during rolling deploys.
Secrets and Configuration
Scoping Model
Secrets resolve with cascading precedence: project > user > org > system. A project-level overrides an org-level .
API_KEYAPI_KEYDesign Rules
- Set secrets per-project. Use . Keep project secrets self-contained.
eve secrets set KEY "value" --project proj_xxx - Use interpolation in the manifest. Reference in service environment blocks. The platform resolves at deploy time.
${secret.KEY} - Validate before deploying. Run to catch missing secret references before they cause deploy failures.
eve manifest validate --validate-secrets - Use for local development. Mirror the production secret keys with local values. This file is gitignored.
.eve/dev-secrets.yaml - Never store secrets in environment variables directly. Always use interpolation. This ensures secrets flow through the platform's resolution and audit chain.
${secret.KEY}
Git Credentials
Agents need repository access. Set either (HTTPS) or (SSH) as project secrets. The worker injects these automatically during git operations.
github_tokenssh_keyObservability and Debugging
The Debugging Ladder
Escalate through these stages:
1. Status → eve env show <project> <env>
2. Diagnose → eve env diagnose <project> <env>
3. Logs → eve env logs <project> <env>
4. Pipeline → eve pipeline logs <pipeline> <run-id> --follow
5. Recover → eve env deploy (rollback) or eve env resetStart at the top. Each stage provides more detail and more cost. Most issues resolve at stages 1-2.
Pipeline Observability
Monitor pipeline execution in real time:
bash
eve pipeline logs <pipeline> <run-id> --follow # stream all steps
eve pipeline logs <pipeline> <run-id> --follow --step build # stream one stepFailed steps include failure hints and link to build diagnostics when applicable.
Build Debugging
When builds fail:
bash
eve build list --project <project_id>
eve build diagnose <build_id>
eve build logs <build_id>Common causes: missing registry credentials, Dockerfile path mismatch, build context too large.
Health Checks
Design services with health endpoints. Eve polls health to determine deployment readiness. A deploy is complete when and .
ready === trueactive_pipeline_run === nullDesign Checklist
Service Topology:
- Each service has one responsibility
- Managed DB declared for Postgres needs
- External services marked with
x-eve.external: true - Only public-facing services have ingress enabled
- Platform-injected env vars used (not hardcoded URLs)
Database:
- Migrations managed via /
eve db neweve db migrate - RLS scaffolded if agents or users query directly
- App data separated from agent data by schema or convention
Pipeline:
- Canonical pipeline defined
build -> release -> deploy - Registry chosen and credentials set as secrets
- OCI labels on Dockerfiles (for GHCR)
- Image digests flow through release (no tag-based deploys)
Environments:
- Staging and production environments defined
- Each environment linked to a pipeline
- Promotion workflow planned (build once, deploy many)
- Recovery procedure known (diagnose -> rollback -> reset)
Secrets:
- All secrets set per-project via
eve secrets set - Manifest uses interpolation
${secret.KEY} - passes
eve manifest validate --validate-secrets - exists for local development
.eve/dev-secrets.yaml - Git credentials (or
github_token) configuredssh_key
Observability:
- Services expose health endpoints
- The debugging ladder is understood (status -> diagnose -> logs -> recover)
- Pipeline logs are accessible via
eve pipeline logs --follow
Cross-References
- Manifest syntax and options:
eve-manifest-authoring - Deploy commands and error resolution:
eve-deploy-debugging - Secret management and access groups:
eve-auth-and-secrets - Pipeline and workflow definitions:
eve-pipelines-workflows - Local development workflow:
eve-local-dev-loop - Layering agentic capabilities onto this foundation:
eve-agentic-app-design